-
Enhancement
-
Resolution: Done
-
Major
-
1.15.4.Final
-
None
This may make more sense in the SASL modules but looking at just the "org.wildfly.security" category we don't have anything that confirms an authentication completed. The following is from an app client test I am debugging:
[darranl@Mirkwood log]$ grep -v tls server.log | grep org.wildfly.security 2021-05-24 11:40:19,165 TRACE [org.wildfly.security.xml] (Thread-195) Fallback to parse legacy configuration. 2021-05-24 11:40:19,166 TRACE [org.wildfly.security.xml] (Thread-195) No legacy configuration available, using AuthenticationContext.empty() 2021-05-24 11:40:19,173 TRACE [org.wildfly.security] (Thread-195) getAuthenticationConfiguration uri=http-remoting://localhost:8080, protocolDefaultPort=-1, abstractType=ejb, abstractTypeAuthority=jboss, MatchRule=[null], AuthenticationConfiguration=[AuthenticationConfiguration:principal=anonymous,set-host=localhost,set-protocol=http-remoting,set-port=8080,providers-supplier=org.wildfly.security.provider.util.ProviderUtil$1@6bc44b78,mechanism-properties={wildfly.sasl.local-user.quiet-auth=true}] 2021-05-24 11:40:19,234 TRACE [org.wildfly.security] (XNIO-1 I/O-1) Created SaslClient for mechanism JBOSS-LOCAL-USER, using Provider WildFlyElytronSaslLocalUserProvider and protocol remote 2021-05-24 11:40:19,234 TRACE [org.wildfly.security] (XNIO-1 I/O-1) Created SaslClient [org.wildfly.security.sasl.util.PrivilegedSaslClient@170d2c85->org.wildfly.security.sasl.util.LocalPrincipalSaslClientFactory$LocalPrincipalSaslClient@222ac055->org.wildfly.security.sasl.localuser.LocalUserClient@53b44b41] for mechanisms [JBOSS-LOCAL-USER, DIGEST-MD5] 2021-05-24 11:40:19,269 TRACE [org.wildfly.security] (Thread-195) getAuthenticationConfiguration uri=http-remoting://localhost:8080, protocolDefaultPort=-1, abstractType=ejb, abstractTypeAuthority=jboss, MatchRule=[null], AuthenticationConfiguration=[AuthenticationConfiguration:principal=anonymous,set-host=localhost,set-protocol=http-remoting,set-port=8080,providers-supplier=org.wildfly.security.provider.util.ProviderUtil$1@6bc44b78,mechanism-properties={wildfly.sasl.local-user.quiet-auth=true}] 2021-05-24 11:40:19,288 TRACE [org.wildfly.security] (Thread-195) getAuthenticationConfiguration uri=http-remoting://localhost:8080, protocolDefaultPort=-1, abstractType=ejb, abstractTypeAuthority=jboss, MatchRule=[], AuthenticationConfiguration=[AuthenticationConfiguration:principal=j2ee,set-host=localhost,set-protocol=http-remoting,set-port=8080,credentials-present,providers-supplier=org.wildfly.security.provider.util.ProviderUtil$1@6bc44b78,sasl-mechanism-selector=(true) -JBOSS-LOCAL-USER,mechanism-properties={wildfly.sasl.local-user.quiet-auth=true}] 2021-05-24 11:40:19,291 TRACE [org.wildfly.security] (XNIO-1 task-1) Created SaslClient for mechanism DIGEST-MD5, using Provider WildFlyElytronSaslDigestProvider and protocol remote 2021-05-24 11:40:19,291 TRACE [org.wildfly.security] (XNIO-1 task-1) Created SaslClient [org.wildfly.security.sasl.util.PrivilegedSaslClient@2595648e->org.wildfly.security.sasl.util.LocalPrincipalSaslClientFactory$LocalPrincipalSaslClient@4fecef8d->org.wildfly.security.sasl.digest.DigestSaslClient@3b703d83] for mechanisms [DIGEST-MD5] 2021-05-24 11:40:19,302 TRACE [org.wildfly.security] (Thread-195) getAuthenticationConfiguration uri=http-remoting://localhost:8080, protocolDefaultPort=-1, abstractType=ejb, abstractTypeAuthority=jboss, MatchRule=[null], AuthenticationConfiguration=[AuthenticationConfiguration:principal=anonymous,set-host=localhost,set-protocol=http-remoting,set-port=8080,providers-supplier=org.wildfly.security.provider.util.ProviderUtil$1@6bc44b78,mechanism-properties={wildfly.sasl.local-user.quiet-auth=true}] 2021-05-24 11:40:19,383 INFO [stdout] (Thread-195) at org.wildfly.security.elytron-private@1.15.3.Final//org.wildfly.security.manager.WildFlySecurityManager.doChecked(WildFlySecurityManager.java:633) 2021-05-24 11:40:19,383 INFO [stdout] (Thread-195) at org.wildfly.security.elytron-private@1.15.3.Final//org.wildfly.security.auth.server.SecurityIdentity.runAsFunctionEx(SecurityIdentity.java:421) [darranl@Mirkwood log]$